Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
3941
Synthesis of Wollastonite Powders by Combustion Method: Role of Amount of Fuel
Published 2018-01-01“…The objective of this work has been the synthesis of wollastonite by solution combustion method. The novelty of this work has been obtaining the crystalline phase without the need of thermal treatments after the synthesis. …”
Get full text
Article -
3942
Homogeneity enhancement of oxide additives in boron carbide by precipitation method
Published 2025-03-01“…The additive-to-boron carbide ratio and calcination conditions were systematically varied and the resulting powders were characterized using SEM, EDX and zeta potential analyses. The precipitation method effectively improved additive dispersion, achieving a uniform distribution. …”
Get full text
Article -
3943
Dimensioness method of assessing the conditions of thermal shock to the reactor vessel
Published 2014-03-01“…The dimensionless method is developed concerning the rating conditions of the thermal shock to reactor vessels. …”
Get full text
Article -
3944
Local Outlier Detection Method Based on Improved K-means
Published 2024-07-01“…The challenge lies in accurately determining the cutoff distance <italic>d</italic><sub>c</sub>, making it difficult to precisely identify the number of cluster centers from the decision graph obtained using a single <italic>d</italic><sub>c </sub>value. The elbow method is employed to determine the optimal number of clusters for an unknown dataset for the best clustering effectiveness to address the challenge of determining the number of clusters. …”
Get full text
Article -
3945
A verification method for DMA controller based on AHB bus
Published 2025-01-01“…To demonstrate the effectiveness of the method, the architecture of the DMA controller UVM verification platform was modified and optimized, and the platform was reused to construct the Image2D controller UVM verification platform. …”
Get full text
Article -
3946
STRUCTURAL RELIABILITY ANALYSIS BASED ON AN IMPROVEMENT OF THE RESPONSE SURFACE METHOD
Published 2018-01-01“…Then the sample points near the failure boundary from all sample points were selected after convergence, the limit state function was built by a quadratic polynomial response surface with mixed terms and square terms, and finally the structural reliability was calculated by the Monte Carlo method. Numerical examples show that the response function is able to approximate the real failure curve, and effectively improves the reliability calculation accuracy, using mixed response surface method during iterations sample points are reduced, in other words computing time in engineering are decreased.…”
Get full text
Article -
3947
LDoS attack detection method based on simple statistical features
Published 2022-11-01“…Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the demand for LDoS attack detection in a real network environment.By studying the principle of LDoS attack and analyzing the features of LDoS attack traffic, a detection method of LDoS attack based on simple statistical features of network traffic was proposed.By using the simple statistical features of network traffic packets, the detection data sequence was constructed, the time correlation features of input samples were extracted by deep learning technology, and the LDoS attack judgment was made according to the difference between the reconstructed sequence and the original input sequence.Experimental results show that the proposed method can effectively detect the LDoS attack traffic in traffic and has strong adaptability to heterogeneous network traffic.…”
Get full text
Article -
3948
Evolution of Aerosol Particles in the Rainfall Process via Method of Moments
Published 2013-01-01“…The method of moments is employed to predict the evolution of aerosol particles in the rainfall process. …”
Get full text
Article -
3949
Research on lightweight malware classification method based on image domain
Published 2025-03-01“…To address the high deployment costs and long prediction times associated with traditional malware classification methods, a lightweight malware visualization classification method was proposed. …”
Get full text
Article -
3950
A New Method of 3D Facial Expression Animation
Published 2014-01-01“…Secondly, through using the method of principle component analysis (PCA), we generate the parameter sets of eigen-ERI space, which will rebuild reasonable expression ratio image. …”
Get full text
Article -
3951
Research on 5G MEC security assessment system and method
Published 2023-08-01“…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
Get full text
Article -
3952
Construction method and application of domain knowledge graph for command and guidance
Published 2025-08-01“…The article summarizes the domain knowledge system for experimental command and guidance requirements, and proposes a domain knowledge graph construction method based on command and guidance data. Using the experience and knowledge of experts, a knowledge system for equipment testing command and adjustment was constructed as the initial ontology of the knowledge graph in this field. …”
Get full text
Article -
3953
Implementation of an On-the-Job Training Method in a Distance Education Environment
Published 2025-02-01Get full text
Article -
3954
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
3955
Building method of distributed COW disk on network computing environment
Published 2012-07-01Get full text
Article -
3956
Non-destructive method for extracting DNA from cowpea seeds
Published 2025-08-01“…Three DNA extraction protocols were evaluated to determine the most suitable non-destructive method: the CTAB method, the NaOH-Tris method and a commercial kit. …”
Get full text
Article -
3957
Landscape Fusion Method Based on Augmented Reality and Multiview Reconstruction
Published 2022-01-01“…At the same time, for the difficulties of 3D model reconstruction requiring relevant expertise and the defects of poor reconstruction effect, the SFM algorithm is used for multiview reconstruction of landscape models to realize the augmented reality fusion method of natural scenes and landscape models. …”
Get full text
Article -
3958
Preparation and Characterization of Zno Nano particles Prepared by Hydrothermal Method
Published 2019-05-01Get full text
Article -
3959
Research on Schedule Management Method Based on Critical Chain Technology
Published 2022-01-01“…Critical chain technology is a new method of project schedule management.In recent years,scholars at home and abroad have increasingly studied this technology.The research on critical chain technology mainly focuses on solving the problems of inter-project operation slack and construction delay caused by unreasonable buffer setting.In this paper,the information entropy theory is employed to build a new buffer setting model that comprehensively considers overall complexity entropy,individual complexity entropy,construction difficulty entropy,resource constraint entropy,and decision-maker preference factor.The root variance method is adopted to improve the buffer calculation formula.Then,the redundant buffer is integrated into the project buffer,and the buffer setting model is modified by absorbing possible risks.Finally,an example is discussed to verify the practicability of the model.The research shows that the proposed model can quantify the impact of risk factors on project schedule more reasonably and comprehensively,improve the accuracy of buffer setting,and effectively solve the series of problems caused by excessive import buffer.…”
Get full text
Article -
3960
Genetic Algorithm-Based Method for Discovering Involutory MDS Matrices
Published 2023-01-01“…Through comprehensive experiments, we demonstrate the effectiveness of our method and also unveil essential insights into automorphism groups within MDS self-dual codes. …”
Get full text
Article